System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24903, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24903 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24903 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 17:02 UTC - **Last Updated**: February 11, 2025 at 18:11 UTC - **Reserved Date**: January 31, 2023 at 20:32 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-415: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26995, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26995 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26995 - **State**: PUBLISHED - **Published Date**: March 15, 2022 at 21:56 UTC - **Last Updated**: August 03, 2024 at 05:18 UTC - **Reserved Date**: March 14, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pptp (wan_pptp.html) function via the pptp_fix_ip, pptp_fix_mask, pptp_fix_gw, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_14/14.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4637 - **State**: PUBLISHED - **Published Date**: December 30, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 03:51 UTC - **Reserved Date**: December 30, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in feedlist/handler_image.php in the FeedList plugin 2.61.01 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42197](http://secunia.com/advisories/42197) 2. [](http://packetstormsecurity.org/1011-exploits/wpfeedlist-xss.txt) 3. [](http://www.johnleitch.net/Vulnerabilities/WordPress.Feed.List.2.61.01.Reflected.Cross-site.Scripting/56) 4. [feedlist-handlerimage-xss(63055)](https://exchange.xforce.ibmcloud.com/vulnerabilities/63055) 5. [69071](http://osvdb.org/69071)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1757 - **State**: PUBLISHED - **Published Date**: June 21, 2011 at 01:00 UTC - **Last Updated**: September 17, 2024 at 00:26 UTC - **Reserved Date**: April 19, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description DJabberd 0.84 and earlier does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[djabberd] 20110604 CVE-2011-1757: djabberd billion laughs vulnerability](http://groups.google.com/group/djabberd/msg/e3b250f3c1877ede?dmode=source)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25611 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 16:04 UTC - **Last Updated**: October 22, 2024 at 20:48 UTC - **Reserved Date**: February 08, 2023 at 13:42 UTC - **Assigned By**: fortinet ### Vulnerability Description A improper neutralization of formula elements in a CSV file vulnerability in Fortinet FortiAnalyzer 6.4.0 - 6.4.9, 7.0.0 - 7.0.5, and 7.2.0 - 7.2.1 allows local attacker to execute unauthorized code or commands via inserting spreadsheet formulas in macro names. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X` ### Weakness Classification (CWE) - CWE-1236: Security Weakness ### Affected Products **Fortinet - FortiAnalyzer** Affected versions: - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) - 6.4.0 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-22-488](https://fortiguard.com/psirt/FG-IR-22-488)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21198 - **State**: PUBLISHED - **Published Date**: October 15, 2024 at 19:52 UTC - **Last Updated**: March 25, 2025 at 16:45 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - * (Status: affected) - * (Status: affected) - * (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8370 - **State**: PUBLISHED - **Published Date**: September 01, 2024 at 22:00 UTC - **Last Updated**: September 03, 2024 at 14:23 UTC - **Reserved Date**: September 01, 2024 at 13:39 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. Unfortunately, the project maintainer does not want to be quoted in any way regarding the dispute rationale. The security policy of the project implies that this finding is "practically irrelevant" due to authentication requirements. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - Grocy** Affected versions: - 4.0.0 (Status: affected) - 4.0.1 (Status: affected) - 4.0.2 (Status: affected) - 4.0.3 (Status: affected) - 4.1.0 (Status: affected) - 4.2.0 (Status: affected) ### References 1. [VDB-276274 | Grocy SVG File Upload recipepictures cross site scripting](https://vuldb.com/?id.276274) 2. [VDB-276274 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276274) 3. [Submit #400844 | Grocy 4.2.0 Authenticated Stored Cross-Site Scripting via Break of Control](https://vuldb.com/?submit.400844) ### Credits - Stux (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46394 - **State**: PUBLISHED - **Published Date**: March 08, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 15:11 UTC - **Reserved Date**: December 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r39p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://developer.arm.com/support/arm-security-updates) 2. [](https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38920, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38920 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38920 - **State**: PUBLISHED - **Published Date**: November 13, 2024 at 00:00 UTC - **Last Updated**: November 18, 2024 at 19:18 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting vulnerability in Cyber Cafe Management System v.1.0 allows a local attacker to execute arbitrary code via a crafted script to the adminname parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/amanahmed000/Cyber-Cafe-Management-System-XSS-Advisory/blob/main/CVE-2023-38920.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8099, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8099 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8099 - **State**: PUBLISHED - **Published Date**: August 20, 2019 at 20:25 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4956 - **State**: REJECTED - **Published Date**: December 30, 2019 at 16:19 UTC - **Last Updated**: December 30, 2019 at 16:19 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28067, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28067 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28067 - **State**: PUBLISHED - **Published Date**: May 04, 2022 at 13:21 UTC - **Last Updated**: August 03, 2024 at 05:41 UTC - **Reserved Date**: March 28, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An incorrect access control issue in Sandboxie Classic v5.55.13 allows attackers to cause a Denial of Service (DoS) in the Sandbox via a crafted executable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/sandboxie-plus/Sandboxie/issues/1714)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5868, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5868 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5868 - **State**: PUBLISHED - **Published Date**: November 22, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 20:04 UTC - **Reserved Date**: November 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in Imagemagick 6.0 before 6.0.6.2, and 6.2 before 6.2.4.5, has unknown impact and user-assisted attack vectors via a crafted SGI image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23101](http://secunia.com/advisories/23101) 2. [oval:org.mitre.oval:def:10612](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10612) 3. [21185](http://www.securityfocus.com/bid/21185) 4. [24284](http://secunia.com/advisories/24284) 5. [23219](http://secunia.com/advisories/23219) 6. [MDKSA-2006:223](http://www.mandriva.com/security/advisories?name=MDKSA-2006:223) 7. [RHSA-2007:0015](http://www.redhat.com/support/errata/RHSA-2007-0015.html) 8. [USN-386-1](http://www.ubuntu.com/usn/usn-386-1) 9. [22998](http://secunia.com/advisories/22998) 10. [24186](http://secunia.com/advisories/24186) 11. [20070201-01-P](ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc) 12. [DSA-1213](http://www.debian.org/security/2006/dsa-1213)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1836, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1836 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1836 - **State**: PUBLISHED - **Published Date**: March 19, 2019 at 13:50 UTC - **Last Updated**: September 16, 2024 at 20:37 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM WebSphere MQ 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.1.0.0, and 9.1.0.1 console is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150661. ### Affected Products **IBM - MQ** Affected versions: - 9.0.2 (Status: affected) - 9.0.3 (Status: affected) - 9.0.4 (Status: affected) - 9.0.5 (Status: affected) - 9.1.0.0 (Status: affected) - 9.1.0.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/docview.wss?uid=ibm10734457) 2. [ibm-websphere-cve20181836-xss (150661)](https://exchange.xforce.ibmcloud.com/vulnerabilities/150661) 3. [107530](http://www.securityfocus.com/bid/107530)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0908, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0908 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0908 - **State**: PUBLISHED - **Published Date**: February 13, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 12:34 UTC - **Reserved Date**: February 13, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-1264](http://www.us.debian.org/security/2007/dsa-1264) 2. [24295](http://secunia.com/advisories/24295) 3. [2007-0009](http://www.trustix.org/errata/2007/0009/) 4. [OpenPKG-SA-2007.010](http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html) 5. [24195](http://secunia.com/advisories/24195) 6. [1017671](http://www.securitytracker.com/id?1017671) 7. [24606](http://secunia.com/advisories/24606) 8. [24642](http://secunia.com/advisories/24642) 9. [24217](http://secunia.com/advisories/24217) 10. [32766](http://osvdb.org/32766) 11. [](http://support.avaya.com/elmodocs2/security/ASA-2007-101.htm) 12. [24248](http://secunia.com/advisories/24248) 13. [php-wddx-information-disclosure(32493)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32493) 14. [24514](http://secunia.com/advisories/24514) 15. [22496](http://www.securityfocus.com/bid/22496) 16. [](https://issues.rpath.com/browse/RPL-1088) 17. [24284](http://secunia.com/advisories/24284) 18. [USN-424-2](http://www.ubuntu.com/usn/usn-424-2) 19. [](http://www.php.net/releases/5_2_1.php) 20. [GLSA-200703-21](http://security.gentoo.org/glsa/glsa-200703-21.xml) 21. [oval:org.mitre.oval:def:11185](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11185) 22. [24432](http://secunia.com/advisories/24432) 23. [24421](http://secunia.com/advisories/24421) 24. [24089](http://secunia.com/advisories/24089) 25. [SUSE-SA:2007:020](http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html) 26. [2321](http://securityreason.com/securityalert/2321) 27. [RHSA-2007:0076](http://www.redhat.com/support/errata/RHSA-2007-0076.html) 28. [24419](http://secunia.com/advisories/24419) 29. [RHSA-2007:0089](http://rhn.redhat.com/errata/RHSA-2007-0089.html) 30. [RHSA-2007:0088](http://www.redhat.com/support/errata/RHSA-2007-0088.html) 31. [20070227 rPSA-2007-0043-1 php php-mysql php-pgsql](http://www.securityfocus.com/archive/1/461462/100/0/threaded) 32. [](http://support.avaya.com/elmodocs2/security/ASA-2007-136.htm) 33. [RHSA-2007:0082](http://www.redhat.com/support/errata/RHSA-2007-0082.html) 34. [22806](http://www.securityfocus.com/bid/22806) 35. [20070201-01-P](ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc) 36. [](http://www.php.net/ChangeLog-5.php#5.2.1) 37. [MDKSA-2007:048](http://www.mandriva.com/security/advisories?name=MDKSA-2007:048) 38. [](http://www.php-security.org/MOPB/MOPB-11-2007.html) 39. [USN-424-1](http://www.ubuntu.com/usn/usn-424-1) 40. [RHSA-2007:0081](http://www.redhat.com/support/errata/RHSA-2007-0081.html) 41. [24322](http://secunia.com/advisories/24322) 42. [24236](http://secunia.com/advisories/24236) 43. [ADV-2007-0546](http://www.vupen.com/english/advisories/2007/0546)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47230 - **State**: PUBLISHED - **Published Date**: May 21, 2024 at 14:19 UTC - **Last Updated**: May 04, 2025 at 07:06 UTC - **Reserved Date**: April 10, 2024 at 18:59 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Immediately reset the MMU context when the SMM flag is cleared Immediately reset the MMU context when the vCPU's SMM flag is cleared so that the SMM flag in the MMU role is always synchronized with the vCPU's flag. If RSM fails (which isn't correctly emulated), KVM will bail without calling post_leave_smm() and leave the MMU in a bad state. The bad MMU role can lead to a NULL pointer dereference when grabbing a shadow page's rmap for a page fault as the initial lookups for the gfn will happen with the vCPU's SMM flag (=0), whereas the rmap lookup will use the shadow page's SMM flag, which comes from the MMU (=1). SMM has an entirely different set of memslots, and so the initial lookup can find a memslot (SMM=0) and then explode on the rmap memslot lookup (SMM=1). general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 8410 Comm: syz-executor382 Not tainted 5.13.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__gfn_to_rmap arch/x86/kvm/mmu/mmu.c:935 [inline] RIP: 0010:gfn_to_rmap+0x2b0/0x4d0 arch/x86/kvm/mmu/mmu.c:947 Code: <42> 80 3c 20 00 74 08 4c 89 ff e8 f1 79 a9 00 4c 89 fb 4d 8b 37 44 RSP: 0018:ffffc90000ffef98 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888015b9f414 RCX: ffff888019669c40 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff811d9cdb R09: ffffed10065a6002 R10: ffffed10065a6002 R11: 0000000000000000 R12: dffffc0000000000 R13: 0000000000000003 R14: 0000000000000001 R15: 0000000000000000 FS: 000000000124b300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000028e31000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rmap_add arch/x86/kvm/mmu/mmu.c:965 [inline] mmu_set_spte+0x862/0xe60 arch/x86/kvm/mmu/mmu.c:2604 __direct_map arch/x86/kvm/mmu/mmu.c:2862 [inline] direct_page_fault+0x1f74/0x2b70 arch/x86/kvm/mmu/mmu.c:3769 kvm_mmu_do_page_fault arch/x86/kvm/mmu.h:124 [inline] kvm_mmu_page_fault+0x199/0x1440 arch/x86/kvm/mmu/mmu.c:5065 vmx_handle_exit+0x26/0x160 arch/x86/kvm/vmx/vmx.c:6122 vcpu_enter_guest+0x3bdd/0x9630 arch/x86/kvm/x86.c:9428 vcpu_run+0x416/0xc20 arch/x86/kvm/x86.c:9494 kvm_arch_vcpu_ioctl_run+0x4e8/0xa40 arch/x86/kvm/x86.c:9722 kvm_vcpu_ioctl+0x70f/0xbb0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3460 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:1069 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:1055 do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x440ce9 ### Affected Products **Linux - Linux** Affected versions: - 9ec19493fb86d6d5fbf9286b94ff21e56ef66376 (Status: affected) - 9ec19493fb86d6d5fbf9286b94ff21e56ef66376 (Status: affected) - 9ec19493fb86d6d5fbf9286b94ff21e56ef66376 (Status: affected) - 9ec19493fb86d6d5fbf9286b94ff21e56ef66376 (Status: affected) **Linux - Linux** Affected versions: - 5.1 (Status: affected) - 0 (Status: unaffected) - 5.4.128 (Status: unaffected) - 5.10.46 (Status: unaffected) - 5.12.13 (Status: unaffected) - 5.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/cbb425f62df9df7abee4b3f068f7ed6ffc3561e2) 2. [](https://git.kernel.org/stable/c/669a8866e468fd020d34eb00e08cb41d3774b71b) 3. [](https://git.kernel.org/stable/c/df9a40cfb3be2cbeb1c17bb67c59251ba16630f3) 4. [](https://git.kernel.org/stable/c/78fcb2c91adfec8ce3a2ba6b4d0dda89f2f4a7c6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3014, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3014 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3014 - **State**: PUBLISHED - **Published Date**: November 30, 2016 at 11:00 UTC - **Last Updated**: August 05, 2024 at 23:40 UTC - **Reserved Date**: March 09, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management 4.0 before 4.0.7 iFix11 and 5.0 before 5.0.2 iFix17, Rational Quality Manager 4.0 before 4.0.7 iFix11 and 5.0 before 5.0.2 iFix17, Rational Team Concert 4.0 before 4.0.7 iFix11 and 5.0 before 5.0.2 iFix17, Rational DOORS Next Generation 4.0 before 4.0.7 iFix11 and 5.0 before 5.0.2 iFix17, Rational Engineering Lifecycle Manager 4.x before 4.0.7 iFix11 and 5.0 before 5.0.2 iFix17, Rational Rhapsody Design Manager 4.0 before 4.0.7 iFix11 and 5.0 before 5.0.2 iFix17, and Rational Software Architect Design Manager 4.0 before 4.0.7 iFix11 and 5.0 before 5.0.2 iFix17 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1037026](http://www.securitytracker.com/id/1037026) 2. [93515](http://www.securityfocus.com/bid/93515) 3. [1037025](http://www.securitytracker.com/id/1037025) 4. [1037028](http://www.securitytracker.com/id/1037028) 5. [](http://www-01.ibm.com/support/docview.wss?uid=swg21992151) 6. [1037027](http://www.securitytracker.com/id/1037027)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2056 - **State**: REJECTED - **Last Updated**: December 30, 2022 at 00:00 UTC - **Reserved Date**: December 04, 2019 at 00:00 UTC - **Assigned By**: palo_alto ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32893 - **State**: PUBLISHED - **Published Date**: August 24, 2022 at 00:00 UTC - **Last Updated**: January 29, 2025 at 16:26 UTC - **Reserved Date**: June 09, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. ### Affected Products **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213414) 2. [](https://support.apple.com/en-us/HT213412) 3. [](https://support.apple.com/en-us/HT213413) 4. [[oss-security] 20220825 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008](http://www.openwall.com/lists/oss-security/2022/08/25/5) 5. [[oss-security] 20220826 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008](http://www.openwall.com/lists/oss-security/2022/08/26/2) 6. [FEDORA-2022-eada5f24a0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/) 7. [DSA-5220](https://www.debian.org/security/2022/dsa-5220) 8. [DSA-5219](https://www.debian.org/security/2022/dsa-5219) 9. [[oss-security] 20220829 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008](http://www.openwall.com/lists/oss-security/2022/08/29/1) 10. [[oss-security] 20220829 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008](http://www.openwall.com/lists/oss-security/2022/08/29/2) 11. [[debian-lts-announce] 20220830 [SECURITY] [DLA 3087-1] webkit2gtk security update](https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html) 12. [GLSA-202208-39](https://security.gentoo.org/glsa/202208-39) 13. [20220831 APPLE-SA-2022-08-31-1 iOS 12.5.6](http://seclists.org/fulldisclosure/2022/Aug/16) 14. [[oss-security] 20220902 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008](http://www.openwall.com/lists/oss-security/2022/09/02/10) 15. [FEDORA-2022-ddfeee50c9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/) 16. [[oss-security] 20220913 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008](http://www.openwall.com/lists/oss-security/2022/09/13/1) 17. [20221030 APPLE-SA-2022-10-27-13 watchOS 9](http://seclists.org/fulldisclosure/2022/Oct/49)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6174, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6174 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6174 - **State**: REJECTED - **Published Date**: July 26, 2018 at 20:00 UTC - **Last Updated**: July 26, 2018 at 19:57 UTC - **Reserved Date**: February 21, 2017 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31717 - **State**: PUBLISHED - **Published Date**: September 21, 2023 at 00:00 UTC - **Last Updated**: September 24, 2024 at 18:39 UTC - **Reserved Date**: April 29, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/frangoteam/FUXA) 2. [](https://youtu.be/IBMXTEI_5wY) 3. [](https://github.com/MateusTesser/CVE-2023-31717)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16206, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16206 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16206 - **State**: PUBLISHED - **Published Date**: January 13, 2019 at 00:00 UTC - **Last Updated**: August 05, 2024 at 10:17 UTC - **Reserved Date**: August 30, 2018 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting vulnerability in WordPress plugin spam-byebye 2.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **Yohsuke Ohkouchi - spam-byebye** Affected versions: - 2.2.1 and earlier (Status: affected) ### References 1. [JVN#58010349](http://jvn.jp/en/jp/JVN58010349/index.html) 2. [](https://wordpress.org/plugins/spam-byebye/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5793, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5793 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5793 - **State**: PUBLISHED - **Published Date**: November 05, 2020 at 19:11 UTC - **Last Updated**: August 04, 2024 at 08:39 UTC - **Reserved Date**: January 06, 2020 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability. ### Affected Products **n/a - Tenable Nessus for Windows and Tenable Nessus Agent for Windows** Affected versions: - Nessus Agent 8.0.0 and 8.1.0 / Nessus 8.9.0 through Nessus 8.12.0 (Status: affected) ### References 1. [](https://www.tenable.com/security/tns-2020-07) 2. [](https://www.tenable.com/security/tns-2020-08)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2935, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2935 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2935 - **State**: PUBLISHED - **Published Date**: May 31, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 13:57 UTC - **Reserved Date**: May 30, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description core/spellcheck/spellcheck.php in Fundanemt before 2.2.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the dict parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [fundanemt-spellcheck-command-execution(34543)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34543) 2. [25421](http://secunia.com/advisories/25421) 3. [3998](https://www.exploit-db.com/exploits/3998) 4. [24185](http://www.securityfocus.com/bid/24185) 5. [](http://www.fundanemt.org/newsarchive/?number=23) 6. [36657](http://osvdb.org/36657)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1424, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1424 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1424 - **State**: PUBLISHED - **Published Date**: October 20, 2007 at 10:00 UTC - **Last Updated**: August 08, 2024 at 02:28 UTC - **Reserved Date**: October 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description message.php in Petitforum does not properly authenticate users, which allows remote attackers to impersonate forum users via a modified connect cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1006117](http://securitytracker.com/id?1006117) 2. [petitforum-message-auth-bypass(11359)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11359)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1029, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1029 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1029 - **State**: PUBLISHED - **Published Date**: April 09, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 22:38 UTC - **Reserved Date**: December 22, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1032, and CVE-2016-1033. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2016:1305](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html) 2. [openSUSE-SU-2016:1306](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html) 3. [RHSA-2016:0610](http://rhn.redhat.com/errata/RHSA-2016-0610.html) 4. [85932](http://www.securityfocus.com/bid/85932) 5. [1035509](http://www.securitytracker.com/id/1035509) 6. [](https://helpx.adobe.com/security/products/flash-player/apsb16-10.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5077 - **State**: PUBLISHED - **Published Date**: January 07, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 10:40 UTC - **Reserved Date**: November 14, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT090002](http://marc.info/?l=bugtraq&m=123859864430555&w=2) 2. [](http://www.vmware.com/security/advisories/VMSA-2009-0004.html) 3. [SUSE-SU-2011:0847](http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html) 4. [](http://support.apple.com/kb/HT3549) 5. [20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses](http://www.securityfocus.com/archive/1/499827/100/0/threaded) 6. [250826](http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1) 7. [](http://www.openssl.org/news/secadv_20090107.txt) 8. [ADV-2009-0558](http://www.vupen.com/english/advisories/2009/0558) 9. [openSUSE-SU-2011:0845](http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html) 10. [HPSBUX02418](http://marc.info/?l=bugtraq&m=123859864430555&w=2) 11. [1021523](http://www.securitytracker.com/id?1021523) 12. [ADV-2009-0362](http://www.vupen.com/english/advisories/2009/0362) 13. [GLSA-200902-02](http://security.gentoo.org/glsa/glsa-200902-02.xml) 14. [HPSBMA02426](http://marc.info/?l=bugtraq&m=124277349419254&w=2) 15. [ADV-2009-0289](http://www.vupen.com/english/advisories/2009/0289) 16. [35074](http://secunia.com/advisories/35074) 17. [](http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm) 18. [34211](http://secunia.com/advisories/34211) 19. [ADV-2009-0040](http://www.vupen.com/english/advisories/2009/0040) 20. [HPSBOV02540](http://marc.info/?l=bugtraq&m=127678688104458&w=2) 21. [APPLE-SA-2009-05-12](http://lists.apple.com/archives/security-announce/2009/May/msg00002.html) 22. [SSA:2009-014-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796) 23. [ADV-2009-0904](http://www.vupen.com/english/advisories/2009/0904) 24. [ADV-2009-0913](http://www.vupen.com/english/advisories/2009/0913) 25. [33557](http://secunia.com/advisories/33557) 26. [33765](http://secunia.com/advisories/33765) 27. [](http://www.ocert.org/advisories/ocert-2008-016.html) 28. [33673](http://secunia.com/advisories/33673) 29. [20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim](http://www.securityfocus.com/archive/1/502322/100/0/threaded) 30. [33436](http://secunia.com/advisories/33436) 31. [35108](http://secunia.com/advisories/35108) 32. [TA09-133A](http://www.us-cert.gov/cas/techalerts/TA09-133A.html) 33. [](http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653) 34. [33150](http://www.securityfocus.com/bid/33150) 35. [RHSA-2009:0004](http://www.redhat.com/support/errata/RHSA-2009-0004.html) 36. [ADV-2009-1297](http://www.vupen.com/english/advisories/2009/1297) 37. [USN-704-1](https://usn.ubuntu.com/704-1/) 38. [33338](http://secunia.com/advisories/33338) 39. [ADV-2009-1338](http://www.vupen.com/english/advisories/2009/1338) 40. [SSRT090053](http://marc.info/?l=bugtraq&m=124277349419254&w=2) 41. [33394](http://secunia.com/advisories/33394) 42. [](http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html) 43. [oval:org.mitre.oval:def:6380](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380) 44. [39005](http://secunia.com/advisories/39005) 45. [oval:org.mitre.oval:def:9155](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4149, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4149 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4149 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7590, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7590 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7590 - **State**: PUBLISHED - **Published Date**: August 12, 2024 at 21:47 UTC - **Last Updated**: August 13, 2024 at 19:18 UTC - **Reserved Date**: August 07, 2024 at 14:06 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Spectra allows Stored XSS.This issue affects Spectra: from n/a through 2.14.1. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Brainstorm Force - Spectra** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ultimate-addons-for-gutenberg/wordpress-spectra-wordpress-gutenberg-blocks-plugin-2-14-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2181, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2181 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2181 - **State**: PUBLISHED - **Published Date**: September 05, 2019 at 21:43 UTC - **Last Updated**: August 04, 2024 at 18:42 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In binder_transaction of binder.c in the Android kernel, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2019-09-01) 2. [USN-4157-1](https://usn.ubuntu.com/4157-1/) 3. [USN-4157-2](https://usn.ubuntu.com/4157-2/) 4. [](http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26723, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26723 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26723 - **State**: PUBLISHED - **Published Date**: February 06, 2021 at 05:35 UTC - **Last Updated**: August 03, 2024 at 20:33 UTC - **Reserved Date**: February 05, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jenzabar.com/blog) 2. [](https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328) 3. [](http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html) 4. [](https://gist.github.com/Y0ung-DST/d1b6b65be6248b0ffc2b2f2120deb205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49574 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 02:23 UTC - **Last Updated**: May 04, 2025 at 08:40 UTC - **Reserved Date**: February 26, 2025 at 02:21 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_recovery. While reading sysctl_tcp_recovery, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers. ### Affected Products **Linux - Linux** Affected versions: - 4f41b1c58a32537542f14c1150099131613a5e8a (Status: affected) - 4f41b1c58a32537542f14c1150099131613a5e8a (Status: affected) - 4f41b1c58a32537542f14c1150099131613a5e8a (Status: affected) - 4f41b1c58a32537542f14c1150099131613a5e8a (Status: affected) - 4f41b1c58a32537542f14c1150099131613a5e8a (Status: affected) - 4f41b1c58a32537542f14c1150099131613a5e8a (Status: affected) **Linux - Linux** Affected versions: - 4.4 (Status: affected) - 0 (Status: unaffected) - 4.19.254 (Status: unaffected) - 5.4.208 (Status: unaffected) - 5.10.134 (Status: unaffected) - 5.15.58 (Status: unaffected) - 5.18.15 (Status: unaffected) - 5.19 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c7a492db1f7c37c758a66915908677bd8bc5d368) 2. [](https://git.kernel.org/stable/c/92c35113c63306091df9211375eebd0abd8c2160) 3. [](https://git.kernel.org/stable/c/d8781f7cd04091744f474a2bada74772084b9dc9) 4. [](https://git.kernel.org/stable/c/a31e2d0cb5cfa2aae3144cac04f25031d5d20fb4) 5. [](https://git.kernel.org/stable/c/52ee7f5c4811ce6be1becd14d38ba1f8a8a0df81) 6. [](https://git.kernel.org/stable/c/e7d2ef837e14a971a05f60ea08c47f3fed1a36e4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32838 - **State**: PUBLISHED - **Published Date**: November 06, 2023 at 03:50 UTC - **Last Updated**: September 05, 2024 at 15:13 UTC - **Reserved Date**: May 16, 2023 at 03:04 UTC - **Assigned By**: MediaTek ### Vulnerability Description In dpe, there is a possible out of bounds write due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310805; Issue ID: ALPS07310805. ### Affected Products **MediaTek, Inc. - MT2713, MT6895, MT6983, MT8188, MT8195, MT8390, MT8395, MT8673, MT8798** Affected versions: - Android 11.0, 12.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/November-2023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11568, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11568 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11568 - **State**: PUBLISHED - **Published Date**: April 27, 2019 at 13:58 UTC - **Last Updated**: August 04, 2024 at 22:55 UTC - **Reserved Date**: April 27, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in AikCms v2.0. There is a File upload vulnerability, as demonstrated by an admin/page/system/nav.php request with PHP code in a .php file with the application/octet-stream content type. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kikulo/DebugOpen/blob/master/Aikcms2.0/main.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4881, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4881 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4881 - **State**: PUBLISHED - **Published Date**: January 19, 2021 at 15:20 UTC - **Last Updated**: September 17, 2024 at 02:56 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the lack of server hostname verification for SSL/TLS communication. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 190851. ### Affected Products **IBM - Planning Analytics** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6404674) 2. [ibm-planning-cve20204881-info-disc (190851)](https://exchange.xforce.ibmcloud.com/vulnerabilities/190851)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14303, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14303 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14303 - **State**: PUBLISHED - **Published Date**: July 06, 2020 at 17:12 UTC - **Last Updated**: August 04, 2024 at 12:39 UTC - **Reserved Date**: June 17, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash. ### Affected Products **n/a - Samba** Affected versions: - All Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B) 2. [](https://www.samba.org/samba/security/CVE-2020-14303.html) 3. [](https://security.netapp.com/advisory/ntap-20200709-0003/) 4. [FEDORA-2020-5131d30947](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/) 5. [openSUSE-SU-2020:0984](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html) 6. [openSUSE-SU-2020:1023](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html) 7. [GLSA-202007-15](https://security.gentoo.org/glsa/202007-15) 8. [USN-4454-2](https://usn.ubuntu.com/4454-2/) 9. [USN-4454-1](https://usn.ubuntu.com/4454-1/) 10. [openSUSE-SU-2020:1313](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html) 11. [[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update](https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31874, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31874 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31874 - **State**: PUBLISHED - **Published Date**: April 10, 2024 at 16:02 UTC - **Last Updated**: August 02, 2024 at 01:59 UTC - **Reserved Date**: April 07, 2024 at 12:44 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Verify Access Appliance 10.0.0 through 10.0.7 uses uninitialized variables when deploying that could allow a local user to cause a denial of service. IBM X-Force ID: 287318. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-457: Security Weakness ### Affected Products **IBM - Security Verify Access Appliance** Affected versions: - 10.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7147932) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/287318)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3627, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3627 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3627 - **State**: PUBLISHED - **Published Date**: July 09, 2007 at 16:00 UTC - **Last Updated**: September 17, 2024 at 03:37 UTC - **Reserved Date**: July 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 allow remote attackers to execute arbitrary SQL commands via the cid parameter to (1) login.php, (2) auth.php, and (3) subscribe.php. NOTE: the month.php, year.php, week.php, and day.php vectors are already covered by CVE-2005-4009. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14504](http://www.securityfocus.com/bid/14504)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2719, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2719 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2719 - **State**: PUBLISHED - **Published Date**: January 18, 2018 at 02:00 UTC - **Last Updated**: October 03, 2024 at 20:26 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Financial Services Hedge Management and IFRS Valuations component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Hedge Management and IFRS Valuations. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Hedge Management and IFRS Valuations, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Hedge Management and IFRS Valuations accessible data as well as unauthorized read access to a subset of Oracle Financial Services Hedge Management and IFRS Valuations accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Financial Services Hedge Management and IFRS Valuations** Affected versions: - 8.0.x (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html) 2. [1040214](http://www.securitytracker.com/id/1040214) 3. [102653](http://www.securityfocus.com/bid/102653)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14290, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14290 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14290 - **State**: PUBLISHED - **Published Date**: July 27, 2019 at 18:39 UTC - **Last Updated**: August 05, 2024 at 00:12 UTC - **Reserved Date**: July 27, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01) 2. [](https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6747, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6747 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6747 - **State**: PUBLISHED - **Published Date**: December 27, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 20:42 UTC - **Reserved Date**: December 26, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in show_news.php in Xt-News 0.1 allows remote attackers to execute arbitrary SQL commands via the id_news parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-5145](http://www.vupen.com/english/advisories/2006/5145) 2. [20061222 Xt-News 0.1 : SQL Injection Vulnerability & XSS](http://www.securityfocus.com/archive/1/455144/100/0/threaded) 3. [23456](http://secunia.com/advisories/23456) 4. [xtnews-shownews-sql-injection(31147)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31147) 5. [21719](http://www.securityfocus.com/bid/21719) 6. [2058](http://securityreason.com/securityalert/2058)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2268 - **State**: PUBLISHED - **Published Date**: March 07, 2024 at 22:31 UTC - **Last Updated**: August 22, 2024 at 18:58 UTC - **Reserved Date**: March 07, 2024 at 14:34 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in keerti1924 Online-Book-Store-Website 1.0. It has been classified as critical. Affected is an unknown function of the file /product_update.php?update=1. The manipulation of the argument update_image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-256038 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **keerti1924 - Online-Book-Store-Website** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-256038 | keerti1924 Online-Book-Store-Website unrestricted upload](https://vuldb.com/?id.256038) 2. [VDB-256038 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256038) 3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md) ### Credits - Joshua Lictan - nochizplz (VulDB User) - nochizplz (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50204 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 02:14 UTC - **Last Updated**: August 02, 2024 at 22:09 UTC - **Reserved Date**: December 05, 2023 at 16:15 UTC - **Assigned By**: zdi ### Vulnerability Description D-Link G416 flupl pythonapp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 wireless routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21297. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **D-Link - G416** Affected versions: - 1.08b02 (Status: affected) ### References 1. [ZDI-23-1820](https://www.zerodayinitiative.com/advisories/ZDI-23-1820/) 2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-21175, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-21175 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-21175 - **State**: PUBLISHED - **Published Date**: April 27, 2020 at 19:39 UTC - **Last Updated**: August 05, 2024 at 12:26 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R6100 before 1.0.1.20, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000055183/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2624)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5335, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5335 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5335 - **State**: PUBLISHED - **Published Date**: June 10, 2025 at 14:50 UTC - **Last Updated**: June 10, 2025 at 14:55 UTC - **Reserved Date**: May 29, 2025 at 14:52 UTC - **Assigned By**: autodesk ### Vulnerability Description A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-426: Security Weakness ### Affected Products **Autodesk - Installer** Affected versions: - 2.13 (Status: affected) ### References 1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0010)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33849 - **State**: PUBLISHED - **Published Date**: May 28, 2024 at 15:22 UTC - **Last Updated**: February 13, 2025 at 15:52 UTC - **Reserved Date**: April 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ci solution CI-Out-of-Office Manager through 6.0.0.77 uses a Hard-coded Cryptographic Key. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.ci-solution.com/produkte/ps-out-of-office.html) 2. [](https://www.syss.de/pentest-blog/rechteausweitung-durch-unsichere-standardkonfiguration-im-ci-out-of-office-manager-syss-2024-013)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1217 - **State**: PUBLISHED - **Published Date**: February 20, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 18:53 UTC - **Reserved Date**: February 20, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in STHS v2 Web Portal 2.2 allow remote attackers to inject arbitrary web script or HTML via the team parameter to (1) prospects.php, (2) prospect.php, or (3) team.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [51991](http://www.securityfocus.com/bid/51991) 2. [sths-prospects-team-sql-injection(73154)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73154) 3. [](http://0nto.wordpress.com/2012/02/13/sths-v2-web-portal-2-2-sql-injection-vulnerabilty/) 4. [](http://packetstormsecurity.org/files/109665/STHS-v2-Web-Portal-2.2-SQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0724, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0724 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0724 - **State**: PUBLISHED - **Published Date**: December 26, 2018 at 16:00 UTC - **Last Updated**: September 17, 2024 at 03:13 UTC - **Reserved Date**: November 28, 2017 at 00:00 UTC - **Assigned By**: qnap ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Q'center Virtual Appliance 1.8.1014 and earlier versions could allow remote attackers to inject Javascript code in the compromised application, a different vulnerability than CVE-2018-0723. ### Affected Products **QNAP - Q'center Virtual Appliance** Affected versions: - Q'center Virtual Appliance 1.8.1014 and earlier versions (Status: affected) ### References 1. [](https://www.qnap.com/zh-tw/security-advisory/nas-201812-26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0255, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0255 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0255 - **State**: PUBLISHED - **Published Date**: February 05, 2024 at 21:21 UTC - **Last Updated**: August 01, 2024 at 17:41 UTC - **Reserved Date**: January 05, 2024 at 19:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wprm-recipe-text-share' shortcode in all versions up to, and including, 9.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **brechtvds - WP Recipe Maker** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/53a51408-e5d8-4727-9dec-8321c062c31e?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-recipe-maker/trunk/includes/public/class-wprm-icon.php#L52) 3. [](https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/class-wprm-icon.php) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52239 - **State**: PUBLISHED - **Published Date**: February 06, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 22:55 UTC - **Reserved Date**: December 29, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The XML parser in Magic xpi Integration Platform 4.13.4 allows XXE attacks, e.g., via onItemImport. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ds-security.com/post/xml_external_entity_injection_magic_xpi/) 2. [](https://www2.magicsoftware.com/ver/docs/Downloads/Magicxpi/4.14/Windows/ReleaseNotes4.14.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4377 - **State**: PUBLISHED - **Published Date**: October 11, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 16:38 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Use-after-free vulnerability in the virtio-pci implementation in Qemu 1.4.0 through 1.6.0 allows local users to cause a denial of service (daemon crash) by "hot-unplugging" a virtio device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[Qemu-devel] 20130920 [PATCH 11/11] virtio-pci: add device_unplugged callback](http://lists.nongnu.org/archive/html/qemu-devel/2013-09/msg03347.html) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1012633) 3. [55015](http://secunia.com/advisories/55015) 4. [USN-2092-1](http://www.ubuntu.com/usn/USN-2092-1) 5. [[oss-security] 20130926 Re: CVE request: qemu host crash from within guest](http://www.openwall.com/lists/oss-security/2013/09/26/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5644, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5644 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5644 - **State**: PUBLISHED - **Published Date**: November 06, 2019 at 18:30 UTC - **Last Updated**: September 16, 2024 at 22:41 UTC - **Reserved Date**: January 07, 2019 at 00:00 UTC - **Assigned By**: rapid7 ### Vulnerability Description Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.5 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may alter several facets of a user account, including promoting any user to an administrator. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Computing For Good - Basic Laboratory Information System** Affected versions: - unspecified (Status: affected) ### References 1. [](https://blog.rapid7.com/2019/09/10/r7-2019-09-cve-2019-5617-cve-2019-5643-cve-2019-5644-c4g-blis-authentication-and-authorization-vulnerabilities-fixed/) ### Credits - This vulnerability was first discovered privately and reported internally by C4G BLIS team member Aditi Shah in December 2018. Jacob Robles of Rapid7 rediscovered and reported these issues in March of 2019 per Rapid7's vulnerability disclosure policy (https://www.rapid7.com/security/disclosure/).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1082 - **State**: PUBLISHED - **Published Date**: March 09, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 16:56 UTC - **Reserved Date**: March 08, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in phpArcadeScript 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the gamename parameter in tellafriend.php, (2) the login_status parameter in loginbox.php, (3) the submissionstatus parameter in index.php, the (4) cell_title_background_color and (5) browse_cat_name parameters in browse.php, the (6) gamefile parameter in displaygame.php, and (7) possibly other parameters in unspecified PHP scripts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [533](http://securityreason.com/securityalert/533) 2. [20060304 phpArcadeScript XSS Injections](http://www.securityfocus.com/archive/1/426755/100/0/threaded) 3. [19124](http://secunia.com/advisories/19124) 4. [ADV-2006-0821](http://www.vupen.com/english/advisories/2006/0821) 5. [16957](http://www.securityfocus.com/bid/16957)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30805 - **State**: PUBLISHED - **Published Date**: October 10, 2023 at 14:25 UTC - **Last Updated**: September 18, 2024 at 18:22 UTC - **Reserved Date**: April 18, 2023 at 10:31 UTC - **Assigned By**: VulnCheck ### Vulnerability Description The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Sangfor - Net-Gen Application Firewall** Affected versions: - 8.0.17 (Status: affected) ### References 1. [](https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/) 2. [](https://vulncheck.com/advisories/sangfor-ngaf-username-rce) 3. [](https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4) ### Credits - watchTowr Labs - watchTowr Labs
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13555 - **State**: PUBLISHED - **Published Date**: November 13, 2019 at 22:27 UTC - **Last Updated**: August 04, 2024 at 23:57 UTC - **Reserved Date**: July 11, 2019 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules. ### Affected Products **n/a - Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior.** Affected versions: - Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior. (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-19-311-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36079 - **State**: PUBLISHED - **Published Date**: September 07, 2022 at 20:40 UTC - **Last Updated**: April 23, 2025 at 17:13 UTC - **Reserved Date**: July 15, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **parse-community - parse-server** Affected versions: - < 4.10.14 (Status: affected) - >= 5.0.0, < 5.2.5 (Status: affected) ### References 1. [](https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6) 2. [](https://github.com/parse-community/parse-server/issues/8143) 3. [](https://github.com/parse-community/parse-server/issues/8144) 4. [](https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec) 5. [](https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4) 6. [](https://github.com/parse-community/parse-server/releases/tag/4.10.14) 7. [](https://github.com/parse-community/parse-server/releases/tag/5.2.5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27339, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27339 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27339 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 01:56 UTC - **Last Updated**: August 02, 2024 at 12:09 UTC - **Reserved Date**: February 28, 2023 at 17:58 UTC - **Assigned By**: zdi ### Vulnerability Description PDF-XChange Editor PNG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNG files. Crafted data in a PNG file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18663. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **PDF-XChange - PDF-XChange Editor** Affected versions: - 9.4.363.0 (Status: affected) ### References 1. [ZDI-23-351](https://www.zerodayinitiative.com/advisories/ZDI-23-351/) 2. [vendor-provided URL](https://www.tracker-software.com/product/pdf-xchange-editor/history)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8665 - **State**: PUBLISHED - **Published Date**: September 13, 2024 at 06:47 UTC - **Last Updated**: September 13, 2024 at 13:40 UTC - **Reserved Date**: September 10, 2024 at 16:49 UTC - **Assigned By**: Wordfence ### Vulnerability Description The YITH Custom Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **yithemes - YITH Custom Login** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0828a4a4-2dd5-4dff-8563-c81d6b24b949?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/yith-custom-login/tags/1.7.3/yit-common/yith-panel.php#L149) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3150123%40yith-custom-login&new=3150123%40yith-custom-login&sfp_email=&sfph_mail=) 4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3150560%40yith-custom-login&new=3150560%40yith-custom-login&sfp_email=&sfph_mail=) ### Credits - Dale Mavers
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46681, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46681 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46681 - **State**: REJECTED - **Last Updated**: May 12, 2023 at 00:00 UTC - **Reserved Date**: December 06, 2022 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5896 - **State**: PUBLISHED - **Published Date**: September 18, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 06, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The kernel in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5868 and CVE-2015-5903. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033609](http://www.securitytracker.com/id/1033609) 2. [](https://support.apple.com/HT205212) 3. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html) 4. [76764](http://www.securityfocus.com/bid/76764) 5. [](https://support.apple.com/HT205267) 6. [APPLE-SA-2015-09-21-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html) 7. [](https://support.apple.com/HT205213) 8. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8314 - **State**: PUBLISHED - **Published Date**: July 11, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 06:54 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when Windows fails a check, allowing a sandbox escape, aka "Windows Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2008 R2, Windows 10. This CVE ID is unique from CVE-2018-8313. ### Affected Products **Microsoft - Windows 7** Affected versions: - 32-bit Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows RT 8.1** Affected versions: - Windows RT 8.1 (Status: affected) **Microsoft - Windows Server 2008** Affected versions: - 32-bit Systems Service Pack 2 (Status: affected) - 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected) - Itanium-Based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Server Core installation) (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 32-bit systems (Status: affected) - x64-based systems (Status: affected) **Microsoft - Windows Server 2008 R2** Affected versions: - Itanium-Based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Server Core installation) (Status: affected) **Microsoft - Windows 10** Affected versions: - 32-bit Systems (Status: affected) - x64-based Systems (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8314) 2. [1041263](http://www.securitytracker.com/id/1041263) 3. [104652](http://www.securityfocus.com/bid/104652)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43179, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43179 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43179 - **State**: PUBLISHED - **Published Date**: November 17, 2022 at 00:00 UTC - **Last Updated**: April 29, 2025 at 19:49 UTC - **Reserved Date**: October 17, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Online Leave Management System v1.0 was discovered to contain a SQL injection vulnerability via the component /admin/?page=user/manage_user&id=. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/debug601/bug_report/blob/main/vendors/oretnom23/online-leave-management-system/SQLi-1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45905 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 00:00 UTC - **Last Updated**: September 13, 2024 at 19:55 UTC - **Reserved Date**: October 16, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/variable/add. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20variable%20management%20with%20added%20functionality.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24375 - **State**: PUBLISHED - **Published Date**: March 07, 2024 at 00:00 UTC - **Last Updated**: August 29, 2024 at 16:53 UTC - **Reserved Date**: January 25, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in Jfinalcms v.5.0.0 allows a remote attacker to obtain sensitive information via /admin/admin name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/RiverGone/records/blob/main/JFinalcms-admin-admin-name.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41144 - **State**: PUBLISHED - **Published Date**: January 26, 2023 at 00:00 UTC - **Last Updated**: April 01, 2025 at 14:53 UTC - **Reserved Date**: September 20, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18282. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **PDF-XChange - PDF-XChange Editor** Affected versions: - 9.4.362.0 (Status: affected) ### References 1. [](https://www.tracker-software.com/product/pdf-xchange-editor/history) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1334/) ### Credits - khangkito - Tran Van Khang (VinCSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19158 - **State**: REJECTED - **Published Date**: July 07, 2022 at 19:44 UTC - **Last Updated**: July 07, 2022 at 19:44 UTC - **Reserved Date**: November 21, 2019 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4322, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4322 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4322 - **State**: PUBLISHED - **Published Date**: January 07, 2011 at 22:00 UTC - **Last Updated**: August 07, 2024 at 03:43 UTC - **Reserved Date**: November 29, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in gwtTeaming.rpc in Novell Vibe OnPrem 3 BETA allows remote authenticated users to inject arbitrary web script or HTML via the Micro Blog (aka What Are You Working On?) field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html) 2. [20101210 Novell Vibe 3 BETA OnPrem Stored Cross-site Scripting Vulnerability](http://www.securityfocus.com/archive/1/515147/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1242 - **State**: PUBLISHED - **Published Date**: April 13, 2011 at 20:07 UTC - **Last Updated**: August 06, 2024 at 22:21 UTC - **Reserved Date**: March 04, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA11-102A](http://www.us-cert.gov/cas/techalerts/TA11-102A.html) 2. [oval:org.mitre.oval:def:12525](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12525) 3. [MS11-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034) 4. [ADV-2011-0952](http://www.vupen.com/english/advisories/2011/0952) 5. [47219](http://www.securityfocus.com/bid/47219) 6. [](http://support.avaya.com/css/P8/documents/100133352) 7. [71757](http://osvdb.org/71757) 8. [44156](http://secunia.com/advisories/44156) 9. [](http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx) 10. [1025345](http://www.securitytracker.com/id?1025345)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25304 - **State**: PUBLISHED - **Published Date**: March 06, 2023 at 00:00 UTC - **Last Updated**: November 27, 2024 at 14:53 UTC - **Reserved Date**: February 06, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in Prism Launcher up to v6.1 allows attackers to perform a directory traversal via importing a crafted .mrpack file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/PrismLauncher/PrismLauncher/security/advisories/GHSA-wxgx-8v36-mj2m)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44974 - **State**: PUBLISHED - **Published Date**: September 04, 2024 at 19:54 UTC - **Last Updated**: May 04, 2025 at 09:30 UTC - **Reserved Date**: August 21, 2024 at 05:34 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: avoid possible UaF when selecting endp select_local_address() and select_signal_address() both select an endpoint entry from the list inside an RCU protected section, but return a reference to it, to be read later on. If the entry is dereferenced after the RCU unlock, reading info could cause a Use-after-Free. A simple solution is to copy the required info while inside the RCU protected section to avoid any risk of UaF later. The address ID might need to be modified later to handle the ID0 case later, so a copy seems OK to deal with. ### Affected Products **Linux - Linux** Affected versions: - 01cacb00b35cb62b139f07d5f84bcf0eeda8eff6 (Status: affected) - 01cacb00b35cb62b139f07d5f84bcf0eeda8eff6 (Status: affected) - 01cacb00b35cb62b139f07d5f84bcf0eeda8eff6 (Status: affected) - 01cacb00b35cb62b139f07d5f84bcf0eeda8eff6 (Status: affected) - 01cacb00b35cb62b139f07d5f84bcf0eeda8eff6 (Status: affected) - 01cacb00b35cb62b139f07d5f84bcf0eeda8eff6 (Status: affected) **Linux - Linux** Affected versions: - 5.7 (Status: affected) - 0 (Status: unaffected) - 5.10.226 (Status: unaffected) - 5.15.167 (Status: unaffected) - 6.1.109 (Status: unaffected) - 6.6.48 (Status: unaffected) - 6.10.7 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/ddee5b4b6a1cc03c1e9921cf34382e094c2009f1) 2. [](https://git.kernel.org/stable/c/f2c865e9e3ca44fc06b5f73b29a954775e4dbb38) 3. [](https://git.kernel.org/stable/c/2b4f46f9503633dade75cb796dd1949d0e6581a1) 4. [](https://git.kernel.org/stable/c/9a9afbbc3fbfca4975eea4aa5b18556db5a0c0b8) 5. [](https://git.kernel.org/stable/c/0201d65d9806d287a00e0ba96f0321835631f63f) 6. [](https://git.kernel.org/stable/c/48e50dcbcbaaf713d82bf2da5c16aeced94ad07d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3989 - **State**: PUBLISHED - **Published Date**: December 12, 2022 at 17:54 UTC - **Last Updated**: April 22, 2025 at 14:45 UTC - **Reserved Date**: November 14, 2022 at 14:45 UTC - **Assigned By**: WPScan ### Vulnerability Description The Motors WordPress plugin before 1.4.4 does not properly validate uploaded files for dangerous file types (such as .php) in an AJAX action, allowing an attacker to sign up on a victim's WordPress instance, upload a malicious PHP file and attempt to launch a brute-force attack to discover the uploaded payload. ### Weakness Classification (CWE) - CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness ### Affected Products **Unknown - Motors** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca32091) ### Credits - cydave
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9281, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9281 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9281 - **State**: PUBLISHED - **Published Date**: September 21, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 17:02 UTC - **Reserved Date**: May 29, 2017 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description An integer overflow (CWE-190) potentially causing an out-of-bounds read (CWE-125) vulnerability in Micro Focus VisiBroker 8.5 can lead to a denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2003 - **State**: PUBLISHED - **Published Date**: July 13, 2023 at 11:25 UTC - **Last Updated**: October 30, 2024 at 16:04 UTC - **Reserved Date**: April 12, 2023 at 14:08 UTC - **Assigned By**: INCIBE ### Vulnerability Description Embedded malicious code vulnerability in Vision1210, in the build 5 of operating system version 4.3, which could allow a remote attacker to store base64-encoded malicious code in the device's data tables via the PCOM protocol, which can then be retrieved by a client and executed on the device. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H` ### Weakness Classification (CWE) - CWE-506: Security Weakness ### Affected Products **Unitronics - Vision1210** Affected versions: - 4.3, build 5 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso-sci/embedded-malicious-code-vulnerability-unitronics-vision1210) 2. [](https://www.hackplayers.com/2023/07/vulnerabilidad-vision1210-unitronics.html) ### Credits - Carlos Antonini Cepeda
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6121 - **State**: PUBLISHED - **Published Date**: December 23, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 12:10 UTC - **Reserved Date**: September 02, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in IBM Security AppScan Enterprise 8.5 before 8.5 IFix 002, 8.6 before 8.6 IFix 004, 8.7 before 8.7 IFix 004, 8.8 before 8.8 iFix 003, 9.0 before 9.0.0.1 iFix 003, and 9.0.1 before 9.0.1 iFix 001 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1031427](http://www.securitytracker.com/id/1031427) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21693035) 3. [ibm-appscan-cve20146121-xss(96722)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96722)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3041 - **State**: PUBLISHED - **Published Date**: April 14, 2015 at 22:00 UTC - **Last Updated**: August 06, 2024 at 05:32 UTC - **Reserved Date**: April 09, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2015:0718](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html) 2. [SUSE-SU-2015:0722](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html) 3. [74062](http://www.securityfocus.com/bid/74062) 4. [GLSA-201504-07](https://security.gentoo.org/glsa/201504-07) 5. [1032105](http://www.securitytracker.com/id/1032105) 6. [RHSA-2015:0813](http://rhn.redhat.com/errata/RHSA-2015-0813.html) 7. [](https://helpx.adobe.com/security/products/flash-player/apsb15-06.html) 8. [openSUSE-SU-2015:0725](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html) 9. [SUSE-SU-2015:0723](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38356, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38356 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38356 - **State**: PUBLISHED - **Published Date**: June 19, 2024 at 20:03 UTC - **Last Updated**: August 02, 2024 at 04:04 UTC - **Reserved Date**: June 14, 2024 at 14:16 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **tinymce - tinymce** Affected versions: - < 5.11.0 (Status: affected) - >= 6.0.0, <6.8.4 (Status: affected) - >= 7.0.0, < 7.2.0 (Status: affected) ### References 1. [https://github.com/tinymce/tinymce/security/advisories/GHSA-9hcv-j9pv-qmph](https://github.com/tinymce/tinymce/security/advisories/GHSA-9hcv-j9pv-qmph) 2. [https://github.com/tinymce/tinymce/commit/5acb741665a98e83d62b91713c800abbff43b00d](https://github.com/tinymce/tinymce/commit/5acb741665a98e83d62b91713c800abbff43b00d) 3. [https://owasp.org/www-community/attacks/xss](https://owasp.org/www-community/attacks/xss) 4. [https://www.tiny.cloud/docs/tinymce/6/6.8.4-release-notes/#overview](https://www.tiny.cloud/docs/tinymce/6/6.8.4-release-notes/#overview) 5. [https://www.tiny.cloud/docs/tinymce/7/7.2-release-notes/#overview](https://www.tiny.cloud/docs/tinymce/7/7.2-release-notes/#overview)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13006 - **State**: PUBLISHED - **Published Date**: December 29, 2024 at 08:00 UTC - **Last Updated**: December 30, 2024 at 14:53 UTC - **Reserved Date**: December 28, 2024 at 09:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in 1000 Projects Human Resource Management System 1.0. This issue affects some unknown processing of the file /employeeview.php. The manipulation of the argument search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **1000 Projects - Human Resource Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-289667 | 1000 Projects Human Resource Management System employeeview.php sql injection](https://vuldb.com/?id.289667) 2. [VDB-289667 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.289667) 3. [Submit #470260 | Human Resource Management System V1.0 sql](https://vuldb.com/?submit.470260) 4. [](https://github.com/Sakurapan/CVE/issues/1) 5. [](https://1000projects.org/) ### Credits - pan jie (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9419, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9419 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9419 - **State**: PUBLISHED - **Published Date**: January 31, 2017 at 22:00 UTC - **Last Updated**: August 06, 2024 at 02:50 UTC - **Reserved Date**: November 17, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Admin control panel in MyBB (aka MyBulletinBoard) before 1.8.8 and MyBB Merge System before 1.8.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.mybb.com/2016/10/17/mybb-1-8-8-merge-system-1-8-8-release/) 2. [[oss-security] 20161117 Re: CVE request: MyBB multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/11/18/1) 3. [[oss-security] 20161110 CVE request: MyBB multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/11/10/8) 4. [94396](http://www.securityfocus.com/bid/94396)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4784 - **State**: PUBLISHED - **Published Date**: July 16, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 06:25 UTC - **Reserved Date**: June 24, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20457 - **State**: PUBLISHED - **Published Date**: November 08, 2022 at 00:00 UTC - **Last Updated**: May 01, 2025 at 15:17 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In getMountModeInternal of StorageManagerService.java, there is a possible prevention of package installation due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-243924784 ### Affected Products **n/a - Android** Affected versions: - Android-13 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2022-11-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9977, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9977 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9977 - **State**: PUBLISHED - **Published Date**: October 15, 2024 at 12:31 UTC - **Last Updated**: October 15, 2024 at 13:27 UTC - **Reserved Date**: October 15, 2024 at 05:58 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **MitraStar - GPT-2541GNAC** Affected versions: - BR_g5.6_1.11(WVK.0)b26 (Status: affected) ### References 1. [VDB-280344 | MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection](https://vuldb.com/?id.280344) 2. [VDB-280344 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.280344) 3. [Submit #423561 | Mitrastar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 OS Command Injection](https://vuldb.com/?submit.423561) 4. [](https://github.com/peritocibernetico/VivoCodeExecutionFirewall/) ### Credits - peritocibernetico (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11414 - **State**: PUBLISHED - **Published Date**: July 18, 2017 at 05:00 UTC - **Last Updated**: August 05, 2024 at 18:05 UTC - **Reserved Date**: July 17, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fiyo CMS 2.0.7 has SQL injection in dapur/apps/app_comment/sys_comment.php via $_POST['comment'], $_POST['name'], $_POST['web'], $_POST['email'], $_POST['status'], $_POST['id'], and $_REQUEST['id']. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FiyoCMS/FiyoCMS/issues/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39327 - **State**: PUBLISHED - **Published Date**: July 13, 2024 at 03:08 UTC - **Last Updated**: November 28, 2024 at 00:20 UTC - **Reserved Date**: July 27, 2023 at 18:04 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in OpenJPEG. Maliciously constructed pictures can cause the program to enter a large loop and continuously print warning messages on the terminal. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 9** ### References 1. [](https://access.redhat.com/security/cve/CVE-2023-39327) 2. [RHBZ#2295812](https://bugzilla.redhat.com/show_bug.cgi?id=2295812)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2361 - **State**: PUBLISHED - **Published Date**: August 22, 2022 at 15:01 UTC - **Last Updated**: August 03, 2024 at 00:32 UTC - **Reserved Date**: July 09, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP Social Chat WordPress plugin before 6.0.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - WP Social Chat – Click To Chat App** Affected versions: - 6.0.5 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/aa69377d-ba9e-4a2f-921c-be2ab5edcb4e) ### Credits - Raad Haddad
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6243, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6243 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6243 - **State**: PUBLISHED - **Published Date**: August 24, 2015 at 23:00 UTC - **Last Updated**: August 06, 2024 at 07:15 UTC - **Reserved Date**: August 14, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.wireshark.org/security/wnpa-sec-2015-23.html) 2. [FEDORA-2015-13945](http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html) 3. [1033272](http://www.securitytracker.com/id/1033272) 4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html) 5. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb1ccbdccde89701f255f921d88992878057477d) 6. [FEDORA-2015-13946](http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165509.html) 7. [76384](http://www.securityfocus.com/bid/76384) 8. [DSA-3367](http://www.debian.org/security/2015/dsa-3367) 9. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11381) 10. [openSUSE-SU-2015:1836](http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html) 11. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22190 - **State**: PUBLISHED - **Published Date**: April 14, 2022 at 15:50 UTC - **Last Updated**: September 16, 2024 at 22:30 UTC - **Reserved Date**: December 21, 2021 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Juniper Networks - Paragon Active Assurance** Affected versions: - 3.1.0 (Status: affected) - unspecified (Status: unaffected) ### References 1. [](https://kb.juniper.net/JSA69500)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-7201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-7201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-7201 - **State**: PUBLISHED - **Published Date**: April 15, 2024 at 05:00 UTC - **Last Updated**: August 09, 2024 at 20:01 UTC - **Reserved Date**: January 02, 2024 at 22:54 UTC - **Assigned By**: WPScan ### Vulnerability Description The Everest Backup WordPress plugin before 2.2.5 does not properly validate backup files to be uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup) ### Weakness Classification (CWE) - CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness ### Affected Products **Unknown - Everest Backup ** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/64ba4461-bbba-45eb-981f-bb5f2e5e56e1/) ### Credits - Emad - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24624, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24624 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24624 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 15:48 UTC - **Last Updated**: April 17, 2025 at 18:17 UTC - **Reserved Date**: January 23, 2025 at 14:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasTech HT Event allows Reflected XSS. This issue affects HT Event: from n/a through 1.4.6. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **HasTech - HT Event** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/ht-event/vulnerability/wordpress-ht-event-wordpress-event-manager-plugin-for-elementor-plugin-1-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3323 - **State**: PUBLISHED - **Published Date**: July 18, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 07, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Directory traversal vulnerability in Cisco Unified Contact Center Enterprise allows remote authenticated users to read arbitrary web-root files via a crafted URL, aka Bug ID CSCun25262. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1030612](http://www.securitytracker.com/id/1030612) 2. [20140716 Cisco Unified Contact Center Enterprise Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3323) 3. [68686](http://www.securityfocus.com/bid/68686)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40464, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40464 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40464 - **State**: PUBLISHED - **Published Date**: July 31, 2024 at 00:00 UTC - **Last Updated**: August 06, 2024 at 17:58 UTC - **Reserved Date**: July 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the sendMail function located in beego/core/logs/smtp.go file ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/nyxfqq/b53b0148b9aa040de63f58a68fd11445)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27668 - **State**: PUBLISHED - **Published Date**: June 14, 2022 at 16:57 UTC - **Last Updated**: August 03, 2024 at 05:33 UTC - **Reserved Date**: March 23, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **SAP SE - SAP NetWeaver and ABAP Platform** Affected versions: - KERNEL 7.49 (Status: affected) - 7.77 (Status: affected) - 7.81 (Status: affected) - 7.85 (Status: affected) - 7.86 (Status: affected) - 7.87 (Status: affected) - 7.88 (Status: affected) - KRNL64NUC 7.49 (Status: affected) - KRNL64UC 7.49 (Status: affected) - SAP_ROUTER 7.53 (Status: affected) - 7.22 (Status: affected) ### References 1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) 2. [](https://launchpad.support.sap.com/#/notes/3158375) 3. [20220915 SEC Consult SA-20220914-0 :: Improper Access Control in SAP SAProuter](http://seclists.org/fulldisclosure/2022/Sep/17) 4. [](http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2897 - **State**: PUBLISHED - **Published Date**: November 12, 2019 at 13:37 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 27, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description gdk-pixbuf through 2.31.1 has GIF loader buffer overflow when initializing decompression tables due to an input validation flaw ### Affected Products **gdk-pixbuf - gdk-pixbuf** Affected versions: - through 2.31.1 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2011-2897) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2897) 3. [](https://access.redhat.com/security/cve/cve-2011-2897)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42459 - **State**: PUBLISHED - **Published Date**: August 02, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 15:05 UTC - **Reserved Date**: August 02, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/indutny/elliptic/pull/317)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37132 - **State**: PUBLISHED - **Published Date**: January 03, 2022 at 21:07 UTC - **Last Updated**: August 04, 2024 at 01:16 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25655 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 04:43 UTC - **Last Updated**: August 03, 2024 at 04:42 UTC - **Reserved Date**: February 22, 2022 at 11:38 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - APQ8009 (Status: affected) - APQ8017 (Status: affected) - APQ8076 (Status: affected) - APQ8084 (Status: affected) - APQ8092 (Status: affected) - APQ8094 (Status: affected) - APQ8096AU (Status: affected) - AQT1000 (Status: affected) - AR8031 (Status: affected) - AR9380 (Status: affected) - CSR8811 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - CSRB31024 (Status: affected) - IPQ4018 (Status: affected) - IPQ4019 (Status: affected) - IPQ4028 (Status: affected) - IPQ4029 (Status: affected) - IPQ5010 (Status: affected) - IPQ5018 (Status: affected) - IPQ5028 (Status: affected) - IPQ6000 (Status: affected) - IPQ6005 (Status: affected) - IPQ6010 (Status: affected) - IPQ6018 (Status: affected) - IPQ6028 (Status: affected) - IPQ8064 (Status: affected) - IPQ8065 (Status: affected) - IPQ8068 (Status: affected) - IPQ8069 (Status: affected) - IPQ8070 (Status: affected) - IPQ8070A (Status: affected) - IPQ8071 (Status: affected) - IPQ8071A (Status: affected) - IPQ8072 (Status: affected) - IPQ8072A (Status: affected) - IPQ8074 (Status: affected) - IPQ8074A (Status: affected) - IPQ8076 (Status: affected) - IPQ8076A (Status: affected) - IPQ8078 (Status: affected) - IPQ8078A (Status: affected) - IPQ8173 (Status: affected) - IPQ8174 (Status: affected) - MDM8215 (Status: affected) - MDM9206 (Status: affected) - MDM9215 (Status: affected) - MDM9235M (Status: affected) - MDM9250 (Status: affected) - MDM9310 (Status: affected) - MDM9330 (Status: affected) - MDM9607 (Status: affected) - MDM9615 (Status: affected) - MDM9628 (Status: affected) - MDM9635M (Status: affected) - MDM9640 (Status: affected) - MDM9650 (Status: affected) - MSM8976 (Status: affected) - MSM8992 (Status: affected) - MSM8994 (Status: affected) - MSM8996AU (Status: affected) - QCA1990 (Status: affected) - QCA4010 (Status: affected) - QCA4020 (Status: affected) - QCA4024 (Status: affected) - QCA6164 (Status: affected) - QCA6174 (Status: affected) - QCA6174A (Status: affected) - QCA6175A (Status: affected) - QCA6310 (Status: affected) - QCA6320 (Status: affected) - QCA6335 (Status: affected) - QCA6390 (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6428 (Status: affected) - QCA6430 (Status: affected) - QCA6438 (Status: affected) - QCA6554A (Status: affected) - QCA6564 (Status: affected) - QCA6564A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584 (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA7500 (Status: affected) - QCA8075 (Status: affected) - QCA8081 (Status: affected) - QCA9367 (Status: affected) - QCA9377 (Status: affected) - QCA9379 (Status: affected) - QCA9531 (Status: affected) - QCA9558 (Status: affected) - QCA9561 (Status: affected) - QCA9880 (Status: affected) - QCA9882 (Status: affected) - QCA9886 (Status: affected) - QCA9887 (Status: affected) - QCA9888 (Status: affected) - QCA9889 (Status: affected) - QCA9898 (Status: affected) - QCA9980 (Status: affected) - QCA9982 (Status: affected) - QCA9984 (Status: affected) - QCA9985 (Status: affected) - QCA9986 (Status: affected) - QCA9987 (Status: affected) - QCA9990 (Status: affected) - QCA9992 (Status: affected) - QCA9994 (Status: affected) - QCC5100 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM4325 (Status: affected) - QCM6125 (Status: affected) - QCN5021 (Status: affected) - QCN5022 (Status: affected) - QCN5024 (Status: affected) - QCN5052 (Status: affected) - QCN5054 (Status: affected) - QCN5064 (Status: affected) - QCN5121 (Status: affected) - QCN5122 (Status: affected) - QCN5124 (Status: affected) - QCN5152 (Status: affected) - QCN5154 (Status: affected) - QCN5164 (Status: affected) - QCN5550 (Status: affected) - QCN6023 (Status: affected) - QCN6024 (Status: affected) - QCN6122 (Status: affected) - QCN6132 (Status: affected) - QCN9000 (Status: affected) - QCN9012 (Status: affected) - QCN9022 (Status: affected) - QCN9024 (Status: affected) - QCN9070 (Status: affected) - QCN9072 (Status: affected) - QCN9074 (Status: affected) - QCN9100 (Status: affected) - QCS2290 (Status: affected) - QCS405 (Status: affected) - QCS410 (Status: affected) - QCS4290 (Status: affected) - QCS603 (Status: affected) - QCS605 (Status: affected) - QCS610 (Status: affected) - QCS6125 (Status: affected) - QFE1922 (Status: affected) - QFE1952 (Status: affected) - SA415M (Status: affected) - SA515M (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SC8180X+SDX55 (Status: affected) - SD 455 (Status: affected) - SD 636 (Status: affected) - SD 675 (Status: affected) - SD 8CX (Status: affected) - SD 8cx Gen2 (Status: affected) - SD460 (Status: affected) - SD480 (Status: affected) - SD660 (Status: affected) - SD662 (Status: affected) - SD665 (Status: affected) - SD670 (Status: affected) - SD675 (Status: affected) - SD678 (Status: affected) - SD680 (Status: affected) - SD690 5G (Status: affected) - SD695 (Status: affected) - SD710 (Status: affected) - SD712 (Status: affected) - SD720G (Status: affected) - SD730 (Status: affected) - SD750G (Status: affected) - SD765 (Status: affected) - SD765G (Status: affected) - SD768G (Status: affected) - SD7c (Status: affected) - SD820 (Status: affected) - SD835 (Status: affected) - SD845 (Status: affected) - SD850 (Status: affected) - SD855 (Status: affected) - SDM630 (Status: affected) - SDX20M (Status: affected) - SDX50M (Status: affected) - SDX55 (Status: affected) - SDX55M (Status: affected) - SDXR1 (Status: affected) - SG4150P (Status: affected) - SM4125 (Status: affected) - SM6250 (Status: affected) - SM6250P (Status: affected) - SM7250P (Status: affected) - Snapdragon 4 Gen 1 (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - WCD9326 (Status: affected) - WCD9330 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9360 (Status: affected) - WCD9370 (Status: affected) - WCD9371 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCN3610 (Status: affected) - WCN3615 (Status: affected) - WCN3660B (Status: affected) - WCN3680B (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WCN3991 (Status: affected) - WCN3998 (Status: affected) - WCN3999 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26619, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26619 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26619 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 13:51 UTC - **Last Updated**: March 27, 2025 at 14:21 UTC - **Reserved Date**: February 12, 2025 at 14:51 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In `vega` 5.30.0 and lower and in `vega-functions` 5.15.0 and lower , it was possible to call JavaScript functions from the Vega expression language that were not meant to be supported. The issue is patched in `vega` `5.31.0` and `vega-functions` `5.16.0`. Some workarounds are available. Run `vega` without `vega.expressionInterpreter`. This mode is not the default as it is slower. Alternatively, using the interpreter described in CSP safe mode (Content Security Policy) prevents arbitrary Javascript from running, so users of this mode are not affected by this vulnerability. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **vega - vega** Affected versions: - < 5.31.0 (Status: affected) ### References 1. [https://github.com/vega/vega/security/advisories/GHSA-rcw3-wmx7-cphr](https://github.com/vega/vega/security/advisories/GHSA-rcw3-wmx7-cphr) 2. [https://github.com/vega/vega-lite/issues/9469](https://github.com/vega/vega-lite/issues/9469) 3. [https://github.com/vega/vega/issues/3984](https://github.com/vega/vega/issues/3984) 4. [https://github.com/vega/vega/commit/8fc129a6f8a11e96449c4ac0f63de0e5bfc7254c](https://github.com/vega/vega/commit/8fc129a6f8a11e96449c4ac0f63de0e5bfc7254c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0039 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: September 12, 2024 at 14:37 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19970501-02-PX](ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX) 2. [http-sgi-webdist(333)](https://exchange.xforce.ibmcloud.com/vulnerabilities/333) 3. [CA-1997-12](http://www.cert.org/advisories/CA-1997-12.html) 4. [374](http://www.securityfocus.com/bid/374) 5. [235](http://www.osvdb.org/235)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14616, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14616 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14616 - **State**: PUBLISHED - **Published Date**: September 20, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 19:34 UTC - **Reserved Date**: September 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An FBX-5312 issue was discovered in WatchGuard Fireware before 12.0. If a login attempt is made in the XML-RPC interface with an XML message containing an empty member element, the wgagent crashes, logging out any user with a session opened in the UI. By continuously executing the failed login attempts, UI management of the device becomes impossible. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.securityfocus.com/archive/1/540427) 2. [](https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19409 - **State**: PUBLISHED - **Published Date**: November 21, 2018 at 16:00 UTC - **Last Updated**: August 05, 2024 at 11:37 UTC - **Reserved Date**: November 21, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-4346](https://www.debian.org/security/2018/dsa-4346) 2. [GLSA-201811-12](https://security.gentoo.org/glsa/201811-12) 3. [USN-3831-1](https://usn.ubuntu.com/3831-1/) 4. [105990](http://www.securityfocus.com/bid/105990) 5. [](https://bugs.ghostscript.com/show_bug.cgi?id=700176) 6. [RHSA-2018:3834](https://access.redhat.com/errata/RHSA-2018:3834) 7. [](https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=661e8d8fb8248c38d67958beda32f3a5876d0c3f) 8. [[debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html) 9. [](https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43483 - **State**: PUBLISHED - **Published Date**: January 18, 2023 at 00:37 UTC - **Last Updated**: January 16, 2025 at 22:00 UTC - **Reserved Date**: December 21, 2022 at 18:52 UTC - **Assigned By**: icscert ### Vulnerability Description Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not properly validate the input module name to the monitor services of the software. This could allow a remote attacker to access sensitive functions of the application and execute arbitrary system commands. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Sewio - RTLS Studio** Affected versions: - 2.0.0 (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01) ### Credits - Andrea Palanca of Nozomi Networks